Sciweavers

7121 search results - page 1335 / 1425
» Modeling Signs Using Functional Data Analysis
Sort
View
DSS
2007
106views more  DSS 2007»
15 years 1 months ago
An investigation of factors that influence the duration of IT outsourcing relationships
Past studies in the IT outsourcing area have examined the management of IT outsourcing relationships from a variety of perspectives. The present paper extends this line of researc...
Jahyun Goo, Rajiv Kishore, Kichan Nam, H. Raghav R...
ALGORITHMICA
1999
84views more  ALGORITHMICA 1999»
15 years 1 months ago
Computational Approaches to Drug Design
Abstract. The rational approach to pharmaceutical drug design begins with an investigation of the relationship between chemical structure and biological activity. Information gaine...
Paul W. Finn, Lydia E. Kavraki
TPDS
2008
183views more  TPDS 2008»
15 years 27 days ago
Avoiding Energy Holes in Wireless Sensor Networks with Nonuniform Node Distribution
In this paper, we investigate the theoretical aspects of the nonuniform node distribution strategy used to mitigate the energy hole problem in wireless sensor networks (WSNs). We c...
Xiaobing Wu, Guihai Chen, Sajal K. Das
TPDS
2010
135views more  TPDS 2010»
14 years 12 months ago
Maximizing Service Reliability in Distributed Computing Systems with Random Node Failures: Theory and Implementation
—In distributed computing systems (DCSs) where server nodes can fail permanently with nonzero probability, the system performance can be assessed by means of the service reliabil...
Jorge E. Pezoa, Sagar Dhakal, Majeed M. Hayat
CONEXT
2010
ACM
14 years 11 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
« Prev « First page 1335 / 1425 Last » Next »